General

  • Target

    controller373.exe

  • Size

    1.0MB

  • Sample

    230522-mpyyeaad9s

  • MD5

    4145cd57f6ac7798ce318c498eef0963

  • SHA1

    27f243974039ca87eeba21a849d8c3bb1d26f607

  • SHA256

    eded2595e47d6d51ccc3b7dd48fb869647d03e0edd6c05e63a58b8872a7f3d72

  • SHA512

    aef5e7e5e7f4beab6f5f0fa72a91c47004d93a8801bdf9ee7e0ef143c3cf9ce2753ff20b51dbb8b10c5bbbe3644963f8f6292880a2cbbf9e98e4b1dd3e200368

  • SSDEEP

    24576:LyJ9kHnmoCJZdOBd/bKPkvY72pLLDLKHZaHt+zcBmAGTYDU8Wr1vHB:+XkHmoCHdOB5mupLLS5IQYgAGTYDUJtH

Malware Config

Extracted

Family

redline

Botnet

mix

C2

77.91.124.251:19065

Attributes
  • auth_value

    5034ed53489733b1fbaf2777113a7d90

Targets

    • Target

      controller373.exe

    • Size

      1.0MB

    • MD5

      4145cd57f6ac7798ce318c498eef0963

    • SHA1

      27f243974039ca87eeba21a849d8c3bb1d26f607

    • SHA256

      eded2595e47d6d51ccc3b7dd48fb869647d03e0edd6c05e63a58b8872a7f3d72

    • SHA512

      aef5e7e5e7f4beab6f5f0fa72a91c47004d93a8801bdf9ee7e0ef143c3cf9ce2753ff20b51dbb8b10c5bbbe3644963f8f6292880a2cbbf9e98e4b1dd3e200368

    • SSDEEP

      24576:LyJ9kHnmoCJZdOBd/bKPkvY72pLLDLKHZaHt+zcBmAGTYDU8Wr1vHB:+XkHmoCHdOB5mupLLS5IQYgAGTYDUJtH

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks